SV-222585r508029_rule
V-222585
SRG-APP-000225
APSC-DV-002310
CAT I
10
Fix any vulnerability found when the application is an insecure state (initialization, shutdown and aborts).
Review application design documentation, vulnerability scanner reports and interview application administrator to identify application components.
The design of the application should account for the following:
- Connections to databases are left open
- Access control mechanisms are disabled
- Data left in temporary locations
Testing application failure will require taking down parts of the application.
Review the vulnerability assessment configuration settings included in vulnerability report.
Examine the application test plans and procedures to determine if this type of failure was previously tested.
If test plans exist, validate the tests by performing a subset of the checks.
If test plans do not exist, an application failure must be simulated.
Simulate a failure. This can be accomplished by stopping the web server service and/or the database service. Also, for applications using web services stop the web service and/or the database.
Check to ensure that application data is still protected. Some examples of tests follow:
- Try to submit SQL queries to the database. Verify that the database requires authentication before returning data.
- Try to read the application source files; access should not be granted to these files because the application is not operating.
- Try to open database files; data should not be available because the application is not operational.
If the application fails in such a way that the application security controls are rendered inoperable, this is a finding.
V-222585
False
APSC-DV-002310
Review application design documentation, vulnerability scanner reports and interview application administrator to identify application components.
The design of the application should account for the following:
- Connections to databases are left open
- Access control mechanisms are disabled
- Data left in temporary locations
Testing application failure will require taking down parts of the application.
Review the vulnerability assessment configuration settings included in vulnerability report.
Examine the application test plans and procedures to determine if this type of failure was previously tested.
If test plans exist, validate the tests by performing a subset of the checks.
If test plans do not exist, an application failure must be simulated.
Simulate a failure. This can be accomplished by stopping the web server service and/or the database service. Also, for applications using web services stop the web service and/or the database.
Check to ensure that application data is still protected. Some examples of tests follow:
- Try to submit SQL queries to the database. Verify that the database requires authentication before returning data.
- Try to read the application source files; access should not be granted to these files because the application is not operating.
- Try to open database files; data should not be available because the application is not operational.
If the application fails in such a way that the application security controls are rendered inoperable, this is a finding.
M
4093